SlideShare uma empresa Scribd logo
1 de 8
MSc CIS7027
Information Security Management
ASSIGNMENT 2012
Critique the employment of ethical hacking as a way
of reviewing and strengthening the security of
information systems
Hansa Edirisinghe
BSc (Hons) University of Portsmouth, UK
MSc IT - Cardiff Metropolitan University, UK
Why did I selected this topic ?
• Hacking is a major security threat in IT
• Organizations find solutions to prevent
their system from hackers
• Employment of Ethical Hacker (EH) is
becoming popular to prevent attacks
How critical the Hacking is?
(According to hackmageddon.com, hacking attacks in the month of October 2012)
Source : http://hackmageddon.com/2012-cyber-attacks-timeline-master-index/
Hackers
White Hat
People who
specialized
hacking
check the
faults of the
system
Grey Hat
Exploit a
security to the
attention of
the owners
Black Hat
People who
break into
networks and
harm to the
network and
property
White Hat is known as Ethical Hacker
Strengthening the security through
EH
• Ensuring the protection of company
confidential information (i.e. Finance, Production,
Marketing, R & D )
• Protect the system from malware/hacking
• Analyze risk assessment and control
vulnerable areas
• Ensure that sensitive information of clients
does not go to wrong hands
Barriers to EH
• Heavy dependence of employee, because
EH has all the company secret information
• Finding a competent and specialist person
• Frequent employee turnover may cause
problems to the organization
“The employment of ethical hacking as a way of
reviewing and strengthening the security of information
systems”
1. Introduction to EH
2. Discussions on,
a) Ensuring the protection of company confidential information
b) Protect the system from malware/hacking
c) Risk assessment and control vulnerable areas
d) Ensuring sensitive information of clients does not go to wrong hands
e) Barriers to EH
3. Evaluation & Recommendation
4. Conclusion
Framework of my Report
Thank You

Mais conteúdo relacionado

Mais procurados

Cyber Crime - What is it?
Cyber Crime - What is it?Cyber Crime - What is it?
Cyber Crime - What is it?Sovan Sinha
 
Cyber crime DAV Vasant Kunj New Delhi
Cyber crime   DAV Vasant Kunj New DelhiCyber crime   DAV Vasant Kunj New Delhi
Cyber crime DAV Vasant Kunj New DelhiNamita Jain
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Cis326week1lesson1
Cis326week1lesson1Cis326week1lesson1
Cis326week1lesson1Fahad_1
 
Electronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsElectronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsTorsten Eymann
 

Mais procurados (9)

Cyber Crime - What is it?
Cyber Crime - What is it?Cyber Crime - What is it?
Cyber Crime - What is it?
 
Cyber crime DAV Vasant Kunj New Delhi
Cyber crime   DAV Vasant Kunj New DelhiCyber crime   DAV Vasant Kunj New Delhi
Cyber crime DAV Vasant Kunj New Delhi
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Harris resume
Harris resumeHarris resume
Harris resume
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Cis326week1lesson1
Cis326week1lesson1Cis326week1lesson1
Cis326week1lesson1
 
Electronic Signatures - Technical Foundations
Electronic Signatures - Technical FoundationsElectronic Signatures - Technical Foundations
Electronic Signatures - Technical Foundations
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 

Destaque

TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...Hansa Edirisinghe
 
Technology Acceptance Model
Technology Acceptance ModelTechnology Acceptance Model
Technology Acceptance ModelMSU-IIT
 
User satisfaction and technology acceptance
User satisfaction and technology acceptanceUser satisfaction and technology acceptance
User satisfaction and technology acceptancePico Ya
 
Presentation about adoption (english)
Presentation about adoption (english)Presentation about adoption (english)
Presentation about adoption (english)Sylvie Vanmechelen
 
Reducing addictive behaviour 2013
Reducing addictive behaviour 2013Reducing addictive behaviour 2013
Reducing addictive behaviour 2013sssfcpsychology
 
Technology adoption
Technology adoptionTechnology adoption
Technology adoption17somya
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: HackingQhaiyum Shah
 
Technology Acceptance Model
Technology Acceptance Model Technology Acceptance Model
Technology Acceptance Model Damian T. Gordon
 
Lecture 5 - Technology diffusion and technology transfer
Lecture 5 - Technology diffusion and technology transferLecture 5 - Technology diffusion and technology transfer
Lecture 5 - Technology diffusion and technology transferUNU.MERIT
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
MTT Séance d'information - Mars 2012
MTT Séance d'information - Mars 2012MTT Séance d'information - Mars 2012
MTT Séance d'information - Mars 2012micheledesrochers
 

Destaque (13)

TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
 
Technology Acceptance Model
Technology Acceptance ModelTechnology Acceptance Model
Technology Acceptance Model
 
User satisfaction and technology acceptance
User satisfaction and technology acceptanceUser satisfaction and technology acceptance
User satisfaction and technology acceptance
 
Presentation about adoption (english)
Presentation about adoption (english)Presentation about adoption (english)
Presentation about adoption (english)
 
Reducing addictive behaviour 2013
Reducing addictive behaviour 2013Reducing addictive behaviour 2013
Reducing addictive behaviour 2013
 
Technology adoption
Technology adoptionTechnology adoption
Technology adoption
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
Technology Acceptance Model
Technology Acceptance Model Technology Acceptance Model
Technology Acceptance Model
 
Lecture 5 - Technology diffusion and technology transfer
Lecture 5 - Technology diffusion and technology transferLecture 5 - Technology diffusion and technology transfer
Lecture 5 - Technology diffusion and technology transfer
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
MTT Séance d'information - Mars 2012
MTT Séance d'information - Mars 2012MTT Séance d'information - Mars 2012
MTT Séance d'information - Mars 2012
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Semelhante a Information Security Management - Hansa Edirisinghe

CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxRiyaNair19
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 
ISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxharigopala
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
LSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGLSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGActonRoy
 
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptxCCNMumbai
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxNarangYadav
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxNapoleon NV
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01rajkumar jonuboyena
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptxBinod Rimal
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptxrabeetkashif
 
Build a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecBuild a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecArrow ECS UK
 

Semelhante a Information Security Management - Hansa Edirisinghe (20)

CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Hacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig ClarkHacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig Clark
 
Hacking the Helpdesk: Social Engineering Risks
Hacking the Helpdesk: Social Engineering RisksHacking the Helpdesk: Social Engineering Risks
Hacking the Helpdesk: Social Engineering Risks
 
ISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptx
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Information security
Information securityInformation security
Information security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
LSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGLSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKING
 
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Build a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecBuild a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with Symantec
 

Mais de Hansa Edirisinghe

DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
ADVANCED SYSTEMS DEVELOPMENT - By Hansa Edirisinghe
ADVANCED SYSTEMS DEVELOPMENT - By Hansa EdirisingheADVANCED SYSTEMS DEVELOPMENT - By Hansa Edirisinghe
ADVANCED SYSTEMS DEVELOPMENT - By Hansa EdirisingheHansa Edirisinghe
 
DATABASE DESIGN AND MANAGEMENT - By Hansa Edirisinghe
DATABASE DESIGN AND MANAGEMENT - By Hansa EdirisingheDATABASE DESIGN AND MANAGEMENT - By Hansa Edirisinghe
DATABASE DESIGN AND MANAGEMENT - By Hansa EdirisingheHansa Edirisinghe
 
Legal Applications in Technology - Analyze the legal and professional impact ...
Legal Applications in Technology - Analyze the legal and professional impact ...Legal Applications in Technology - Analyze the legal and professional impact ...
Legal Applications in Technology - Analyze the legal and professional impact ...Hansa Edirisinghe
 
Legal Applications in Technology - Analyze the legal and professional impact ...
Legal Applications in Technology - Analyze the legal and professional impact ...Legal Applications in Technology - Analyze the legal and professional impact ...
Legal Applications in Technology - Analyze the legal and professional impact ...Hansa Edirisinghe
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 

Mais de Hansa Edirisinghe (6)

DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
ADVANCED SYSTEMS DEVELOPMENT - By Hansa Edirisinghe
ADVANCED SYSTEMS DEVELOPMENT - By Hansa EdirisingheADVANCED SYSTEMS DEVELOPMENT - By Hansa Edirisinghe
ADVANCED SYSTEMS DEVELOPMENT - By Hansa Edirisinghe
 
DATABASE DESIGN AND MANAGEMENT - By Hansa Edirisinghe
DATABASE DESIGN AND MANAGEMENT - By Hansa EdirisingheDATABASE DESIGN AND MANAGEMENT - By Hansa Edirisinghe
DATABASE DESIGN AND MANAGEMENT - By Hansa Edirisinghe
 
Legal Applications in Technology - Analyze the legal and professional impact ...
Legal Applications in Technology - Analyze the legal and professional impact ...Legal Applications in Technology - Analyze the legal and professional impact ...
Legal Applications in Technology - Analyze the legal and professional impact ...
 
Legal Applications in Technology - Analyze the legal and professional impact ...
Legal Applications in Technology - Analyze the legal and professional impact ...Legal Applications in Technology - Analyze the legal and professional impact ...
Legal Applications in Technology - Analyze the legal and professional impact ...
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 

Último

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Último (20)

Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 

Information Security Management - Hansa Edirisinghe

  • 1. MSc CIS7027 Information Security Management ASSIGNMENT 2012 Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems Hansa Edirisinghe BSc (Hons) University of Portsmouth, UK MSc IT - Cardiff Metropolitan University, UK
  • 2. Why did I selected this topic ? • Hacking is a major security threat in IT • Organizations find solutions to prevent their system from hackers • Employment of Ethical Hacker (EH) is becoming popular to prevent attacks
  • 3. How critical the Hacking is? (According to hackmageddon.com, hacking attacks in the month of October 2012) Source : http://hackmageddon.com/2012-cyber-attacks-timeline-master-index/
  • 4. Hackers White Hat People who specialized hacking check the faults of the system Grey Hat Exploit a security to the attention of the owners Black Hat People who break into networks and harm to the network and property White Hat is known as Ethical Hacker
  • 5. Strengthening the security through EH • Ensuring the protection of company confidential information (i.e. Finance, Production, Marketing, R & D ) • Protect the system from malware/hacking • Analyze risk assessment and control vulnerable areas • Ensure that sensitive information of clients does not go to wrong hands
  • 6. Barriers to EH • Heavy dependence of employee, because EH has all the company secret information • Finding a competent and specialist person • Frequent employee turnover may cause problems to the organization
  • 7. “The employment of ethical hacking as a way of reviewing and strengthening the security of information systems” 1. Introduction to EH 2. Discussions on, a) Ensuring the protection of company confidential information b) Protect the system from malware/hacking c) Risk assessment and control vulnerable areas d) Ensuring sensitive information of clients does not go to wrong hands e) Barriers to EH 3. Evaluation & Recommendation 4. Conclusion Framework of my Report